Warning: Permanently added '10.128.0.185' (ECDSA) to the list of known hosts. 2020/05/04 10:19:05 parsed 1 programs syzkaller login: [ 97.658475][ T3831] kmemleak: Automatic memory scanning thread ended 2020/05/04 10:19:13 executed programs: 0 [ 105.124138][ T26] audit: type=1400 audit(1588587553.493:8): avc: denied { execmem } for pid=6657 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 105.136380][ T6658] IPVS: ftp: loaded support on port[0] = 21 [ 105.171946][ T6658] chnl_net:caif_netlink_parms(): no params data found [ 105.194922][ T6658] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.201974][ T6658] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.209469][ T6658] device bridge_slave_0 entered promiscuous mode [ 105.216258][ T6658] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.223876][ T6658] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.231455][ T6658] device bridge_slave_1 entered promiscuous mode [ 105.241063][ T6658] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.250704][ T6658] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.262887][ T6658] team0: Port device team_slave_0 added [ 105.268919][ T6658] team0: Port device team_slave_1 added [ 105.277484][ T6658] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 105.284801][ T6658] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.311118][ T6658] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 105.322304][ T6658] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 105.329740][ T6658] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.355765][ T6658] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 105.409925][ T6658] device hsr_slave_0 entered promiscuous mode [ 105.479238][ T6658] device hsr_slave_1 entered promiscuous mode [ 105.538481][ T6658] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 105.569990][ T6658] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 105.619883][ T6658] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 105.689877][ T6658] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 105.743832][ T6658] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.750883][ T6658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.758132][ T6658] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.765178][ T6658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.781766][ T6658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.791137][ T6861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.798579][ T6861] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.806090][ T6861] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.814310][ T6861] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 105.823036][ T6658] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.831190][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.839336][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.846339][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.860302][ T6658] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 105.870650][ T6658] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 105.881798][ T6863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.890277][ T6863] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.897294][ T6863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.904900][ T6863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.913296][ T6863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.921324][ T6863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.929262][ T6863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.937282][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 105.944667][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 105.954616][ T6861] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 105.962089][ T6861] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 105.971214][ T6658] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.981482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.992908][ T6658] device veth0_vlan entered promiscuous mode [ 105.999420][ T6861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.007276][ T6861] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.014885][ T6861] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.024070][ T6658] device veth1_vlan entered promiscuous mode [ 106.034072][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 106.041967][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 106.049774][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 106.058485][ T6658] device veth0_macvtap entered promiscuous mode [ 106.066013][ T6658] device veth1_macvtap entered promiscuous mode [ 106.075360][ T6658] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 106.082578][ T6861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 106.090975][ T6861] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 106.099996][ T6658] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 106.107287][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/05/04 10:19:20 executed programs: 1 2020/05/04 10:19:26 executed programs: 3 2020/05/04 10:19:31 executed programs: 5 [ 124.692663][ T6909] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 128.975212][ T6909] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888113403240 (size 2200): comm "syz-executor.0", pid 6898, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): ac 14 14 bb ac 14 14 0a 54 b1 1a 19 40 01 00 00 ........T...@... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000017b2d97d>] sk_prot_alloc+0x3c/0x170 [<000000002490047a>] sk_alloc+0x30/0x330 [<00000000672ff2b4>] inet_create+0x119/0x450 [<0000000024c1881d>] __sock_create+0x14a/0x220 [<000000002b1dca91>] __sys_socket+0x60/0x110 [<000000007a8b0ada>] __x64_sys_socket+0x1a/0x20 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888118af9700 (size 32): comm "syz-executor.0", pid 6898, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 c0 de e3 13 81 88 ff ff ................ 01 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ backtrace: [<00000000bad3d3a5>] selinux_sk_alloc_security+0x43/0xa0 [<00000000254331f5>] security_sk_alloc+0x42/0x70 [<000000006ac681e3>] sk_prot_alloc+0x9c/0x170 [<000000002490047a>] sk_alloc+0x30/0x330 [<00000000672ff2b4>] inet_create+0x119/0x450 [<0000000024c1881d>] __sock_create+0x14a/0x220 [<000000002b1dca91>] __sys_socket+0x60/0x110 [<000000007a8b0ada>] __x64_sys_socket+0x1a/0x20 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888113f70600 (size 512): comm "syz-executor.0", pid 6898, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): 40 32 40 13 81 88 ff ff 00 00 00 00 00 00 00 00 @2@............. 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 ................ backtrace: [<00000000dcbf2172>] sk_psock_init+0x2a/0x180 [<00000000f0d7a04c>] sock_map_link.isra.0+0x469/0x4f0 [<00000000396cf2d6>] sock_map_update_common+0xa1/0x3c0 [<00000000951ce791>] sock_map_update_elem+0x1e9/0x220 [<00000000b18b6462>] bpf_map_update_value.isra.0+0x141/0x2f0 [<0000000076b7aa1b>] __do_sys_bpf+0x15e0/0x1f60 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888115a63280 (size 2200): comm "syz-executor.0", pid 6900, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): ac 14 14 bb ac 14 14 0a 99 8d ac 9b 40 01 00 00 ............@... 02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............ backtrace: [<0000000017b2d97d>] sk_prot_alloc+0x3c/0x170 [<000000002490047a>] sk_alloc+0x30/0x330 [<00000000672ff2b4>] inet_create+0x119/0x450 [<0000000024c1881d>] __sock_create+0x14a/0x220 [<000000002b1dca91>] __sys_socket+0x60/0x110 [<000000007a8b0ada>] __x64_sys_socket+0x1a/0x20 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888113ca0c80 (size 32): comm "syz-executor.0", pid 6900, jiffies 4294949031 (age 13.810s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 00 89 cc 13 81 88 ff ff ................ 01 00 00 00 00 00 00 00 10 00 00 00 00 00 00 00 ................ backtrace: [<00000000bad3d3a5>] selinux_sk_alloc_security+0x43/0xa0 [<00000000254331f5>] security_sk_alloc+0x42/0x70 [<000000006ac681e3>] sk_prot_alloc+0x9c/0x170 [<000000002490047a>] sk_alloc+0x30/0x330 [<00000000672ff2b4>] inet_create+0x119/0x450 [<0000000024c1881d>] __sock_create+0x14a/0x220 [<000000002b1dca91>] __sys_socket+0x60/0x110 [<000000007a8b0ada>] __x64_sys_socket+0x1a/0x20 [<00000000b9eba563>] do_syscall_64+0x6e/0x220 [<00000000c435cdb0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9